Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

The Characteristics Of Successful Military It Projects: A Cross-Country Empirical Study, Helene Berg, Jonathan D. Ritschel Jul 2023

The Characteristics Of Successful Military It Projects: A Cross-Country Empirical Study, Helene Berg, Jonathan D. Ritschel

Faculty Publications

No abstract provided.


Artificial Neural Networks And Gradient Boosted Machines Used For Regression To Evaluate Gasification Processes: A Review, Owen Sedej, Eric Mbonimpa, Trevor Sleight, Jeremy M. Slagley Aug 2022

Artificial Neural Networks And Gradient Boosted Machines Used For Regression To Evaluate Gasification Processes: A Review, Owen Sedej, Eric Mbonimpa, Trevor Sleight, Jeremy M. Slagley

Faculty Publications

Waste-to-Energy technologies have the potential to dramatically improve both the natural and human environment. One type of waste-to-energy technology that has been successful is gasification. There are numerous types of gasification processes and in order to drive understanding and the optimization of these systems, traditional approaches like computational fluid dynamics software have been utilized to model these systems. The modern advent of machine learning models has allowed for accurate and computationally efficient predictions for gasification systems that are informed by numerous experimental and numerical solutions. Two types of machine learning models that have been widely used to solve for quantitative …


A Unified View Of A Human Digital Twin, Michael Miller, Emily Spatz Jun 2022

A Unified View Of A Human Digital Twin, Michael Miller, Emily Spatz

Faculty Publications

The term human digital twin has recently been applied in many domains, including medical and manufacturing. This term extends the digital twin concept, which has been illustrated to provide enhanced system performance as it combines system models and analyses with real-time measurements for an individual system to improve system maintenance. Human digital twins have the potential to change the practice of human system integration as these systems employ real-time sensing and feedback to tightly couple measurements of human performance, behavior, and environmental influences throughout a product’s life cycle to human models to improve system design and performance. However, as this …


Agile Software Development: Creating A Cost Of Delay Framework For Air Force Software Factories, J. Goljan, Jonathan D. Ritschel, Scott Drylie, Edward D. White Jan 2021

Agile Software Development: Creating A Cost Of Delay Framework For Air Force Software Factories, J. Goljan, Jonathan D. Ritschel, Scott Drylie, Edward D. White

Faculty Publications

The Air Force software development environment is experiencing a paradigm shift. The 2019 Defense Innovation Board concluded that speed and cycle time must become the most important software metrics if the US military is to maintain its advantage over adversaries.1 This article proposes utilizing a cost-o­f-d­elay (CoD) framework to prioritize projects toward optimizing readiness. Cost-­of-d­elay is defined as the economic impact resulting from a delaying product delivery or, said another way, opportunity cost. In principle, CoD assesses the negative impacts resulting from changes to the priority of a project.


Evaluation Criteria For Selecting Nosql Databases In A Single Box Environment, Ryan D. Engle, Brent T. Langhals, Michael R. Grimaila, Douglas D. Hodson Aug 2018

Evaluation Criteria For Selecting Nosql Databases In A Single Box Environment, Ryan D. Engle, Brent T. Langhals, Michael R. Grimaila, Douglas D. Hodson

Faculty Publications

In recent years, NoSQL database systems have become increasingly popular, especially for big data, commercial applications. These systems were designed to overcome the scaling and flexibility limitations plaguing traditional relational database management systems (RDBMSs). Given NoSQL database systems have been typically implemented in large-scale distributed environments serving large numbers of simultaneous users across potentially thousands of geographically separated devices, little consideration has been given to evaluating their value within single-box environments. It is postulated some of the inherent traits of each NoSQL database type may be useful, perhaps even preferable, regardless of scale. Thus, this paper proposes criteria conceived to …


Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore Jul 2012

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore

Faculty Publications

The Global Information Grid (GIG) is the military’s computer and communications network which supports the myriad of military missions. Military missions are highly planned, passing through many hands in the strategy-to-task methodology to ensure completeness, accuracy, coordination, cohesion, and appropriateness. A benefit of this planning is the possibility to collect knowledge of future conditions that could be of use to network designers whose goals include optimizing and protecting the GIG. This advanced knowledge includes which networked military equipment will be involved, what their capabilities are, where they will be, when they will be there, and particulars on the required data …


Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson Jul 2012

Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson

Faculty Publications

Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event …


Wolf Ant, Gilbert L. Peterson, Christopher M. Mayer, Kevin Cousin Jun 2011

Wolf Ant, Gilbert L. Peterson, Christopher M. Mayer, Kevin Cousin

Faculty Publications

Ant colony optimization (ACO) algorithms can generate quality solutions to combinatorial optimization problems. However, like many stochastic algorithms, the quality of solutions worsen as problem sizes grow. In an effort to increase performance, we added the variable step size off-policy hill-climbing algorithm called PDWoLF (Policy Dynamics Win or Learn Fast) to several ant colony algorithms: Ant System, Ant Colony System, Elitist-Ant System, Rank-based Ant System, and Max-Min Ant System. Easily integrated into each ACO algorithm, the PDWoLF component maintains a set of policies separate from the ant colony's pheromone. Similar to pheromone but with different update rules, the PDWoLF policies …